ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 370 - CAS-004 discussion

Report
Export

The principal security analyst for a global manufacturer is investigating a security incident related to abnormal behavior in the ICS network. A controller was restarted as part of the troubleshooting process, and the following issue was identified when the controller was restarted:

During the investigation, this modified firmware version was identified on several other controllers at the site. The official vendor firmware versions do not have this checksum. Which of the following stages of the MITRE ATT&CK framework for ICS includes this technique?

A.
Evasion
Answers
A.
Evasion
B.
Persistence
Answers
B.
Persistence
C.
Collection
Answers
C.
Collection
D.
Lateral movement
Answers
D.
Lateral movement
Suggested answer: B

Explanation:

The MITRE ATT&CK framework for ICS (Industrial Control Systems) details various tactics and techniques that may be used by adversaries. In the scenario described, the presence of unexpected firmware versions with a checksum that does not match the official vendor firmware indicates that the firmware has been modified. In the MITRE ATT&CK framework for ICS, this falls under the 'Persistence' tactic, as it demonstrates an adversary's ability to maintain their foothold within the environment through unauthorized modification of device firmware.

asked 02/10/2024
Aung Nyi Nyi Win
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first